I am having issues remotely logging in via SSH into one of my Debian machines using public key authentication. The login user has an encrypted home directory. The directory isn't mounted until after login. I can at least login via public key authentication by setting AuthorizedKeysFile in sshd_config to a static location for the user. That works to login, but now the home directory isn't mounted - likely because it needs the password. Id

rwp, keymaps are configured manually so I need to know which map goes to which key . . . I've never known that to be automatic, that is always asked on install -- usually the default for the laptop or region is used I think.

user01, Note that one should be able to "dpkg-reconfigure console-setup" and use the dialog there to reconfigure it. However I know that wasn't your question as you were trying to locate the correct choice to choose.

KombuchaKip, If your $HOME is encrypted and not decrypted until after you log in then you will never be able to use $HOME/.ssh/authorized_keys to log in. But you can check sshd_config for AuthorizedKeysFile because one can configure it to use keys from a different location that is available.

rwp: Yeah, that's about as far as I got. I think the only way to make it work fully is if ecryptfs was patched to allow other methods of authentication besides plain text passphrase to mount the home directory.

rwp: The problem with authenticating as root is root still needs to enter the passphrase for the user's home directory to unmount and the only way it can do that is if it stores it in plaintext which is a no-go

Raspbian is a distribution <based on Debian> made specifically for the <Raspberry Pi>. Raspbian is not Debian and it is not supported in #debian. Please use #raspbian on irc.freenode.net for support. http://www.raspbian.org/